Analysis
-
max time kernel
113s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe
Resource
win10v2004-20220901-en
General
-
Target
017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe
-
Size
384KB
-
MD5
852fc2efecfb5de6eb5731f18b68b926
-
SHA1
bc4318d65f0ca03a56e7d492cd4006e433abe35c
-
SHA256
017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780
-
SHA512
280b5e14772a530cff75e3351986ce0ad4e4942ae63fc33adb57808972a2ce576691335af5aebcafae119cd563b7a54ce8ce2d5d3b5b743a8cc77c67c1aa464a
-
SSDEEP
6144:e+qWG3RqF0pQ0aB7lEFMDQNbdEg4Le7xVV+tE5AdmzcSA5w4DTP:e+qWGBqF0pQ0A7lWMDQ1dEgW2xV8tECv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4348 Update.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\integrate\Update.exe 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 4348 Update.exe 4348 Update.exe 4348 Update.exe 4348 Update.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4348 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 84 PID 4048 wrote to memory of 4348 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 84 PID 4048 wrote to memory of 4348 4048 017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe"C:\Users\Admin\AppData\Local\Temp\017ab5ac43ee1949d6fb66606a66c5b4dad22561461a3130f3b5e48e2e67e780.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files\integrate\Update.exe"C:\Program Files\integrate\Update.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD57ee944787a86a567f987575c2422ee9f
SHA1ae04a2404a3e6bcace167ee95031d61609ce4978
SHA256ab66c2502f983be9d422cd7baafdf7a9d8755dcabab75e2d3bfb9cc770f79ef3
SHA5129f0badcfe239ff654b45dca130eb339cb7640169724cbe4af5d49ad139a1fed133857577b68529895078680c2cba69ee2132bb92d7fd834e017516591a7ade6c
-
Filesize
384KB
MD57ee944787a86a567f987575c2422ee9f
SHA1ae04a2404a3e6bcace167ee95031d61609ce4978
SHA256ab66c2502f983be9d422cd7baafdf7a9d8755dcabab75e2d3bfb9cc770f79ef3
SHA5129f0badcfe239ff654b45dca130eb339cb7640169724cbe4af5d49ad139a1fed133857577b68529895078680c2cba69ee2132bb92d7fd834e017516591a7ade6c